We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
DirectX: The New Hyper-V Attack Surface
Discover the shocking new attack surface in DirectX, including vulnerabilities in DSGK-VMB, vid-shi-signal-sync-object and DSG_KERNEL_Linux_KERNEL, and how they can be exploited using DxG kernel IOCTLs.
-
The DSGK-VMB command is vulnerable to attacks due to the lack of proper initialization of variables in the
cvn32k_logsstructure. -
The
vid-shi-signal-sync-objectfunction is vulnerable to non-pointer reference vulnerabilities, allowing an attacker to control the ISRs and access arbitrary memory locations. -
The
DSG_HOST_VIRTUAL_GPU_VMBOS_VMBOS_COMMAND_TABLE_VGPU2_HOST_TABLEtable contains a large number of commands that can be used to exploit the vulnerability. -
The
DSG_KERNEL_Linux_KERNELmodule is vulnerable to arbitrary address read vulnerabilities due to the lack of proper bounds checking. -
The
DxG kernelthrough a set of IOCTLs, provides a way to interact with theDSG kerneland exploit the vulnerability. -
The
Hyper-V direct as componentarchitecture provides a new attack surface that can be exploited by an attacker.